暂无分享,去创建一个
[1] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[2] Sachin S. Talathi,et al. Fixed Point Quantization of Deep Convolutional Networks , 2015, ICML.
[3] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[4] Miriam A. M. Capretz,et al. MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[5] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[6] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Thomas Brox,et al. Striving for Simplicity: The All Convolutional Net , 2014, ICLR.
[9] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[10] Richard G. Baraniuk,et al. A Probabilistic Theory of Deep Learning , 2015, ArXiv.
[11] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[12] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[13] Patrick D. McDaniel,et al. On the (Statistical) Detection of Adversarial Examples , 2017, ArXiv.
[14] Benny Pinkas,et al. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring , 2018, USENIX Security Symposium.
[15] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[16] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[17] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[18] Yann LeCun,et al. The Loss Surfaces of Multilayer Networks , 2014, AISTATS.
[19] Xiaolin Hu,et al. Recurrent convolutional neural network for object recognition , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Surya Ganguli,et al. Identifying and attacking the saddle point problem in high-dimensional non-convex optimization , 2014, NIPS.
[21] Tara Javidi,et al. Safe Machine Learning and Defeating Adversarial Attacks , 2018, IEEE Security & Privacy.
[22] Shin'ichi Satoh,et al. Digital watermarking for deep neural networks , 2018, International Journal of Multimedia Information Retrieval.
[23] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[24] Tara Javidi,et al. CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning , 2017, IEEE Transactions on Dependable and Secure Computing.
[25] Shin'ichi Satoh,et al. Embedding Watermarks into Deep Neural Networks , 2017, ICMR.
[26] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[27] Farinaz Koushanfar,et al. DeLight: Adding Energy Dimension To Deep Neural Networks , 2016, ISLPED.
[28] Nima Tajbakhsh,et al. Convolutional Neural Networks for Medical Image Analysis: Full Training or Fine Tuning? , 2016, IEEE Transactions on Medical Imaging.
[29] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[30] Farinaz Koushanfar,et al. Deep3: Leveraging three levels of parallelism for efficient Deep Learning , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[31] Chun-Shien Lu,et al. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .
[32] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[33] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[34] Miodrag Potkonjak,et al. Intellectual Property Protection in VLSI Designs: Theory and Practice , 2003 .
[35] Erwan Le Merrer,et al. Adversarial frontier stitching for remote neural network watermarking , 2017, Neural Computing and Applications.